International Scientific Journal of Engineering and Technology (ISJET)

Regular Editions

Authors

:

Hari Priya.CH, Mr. Ramarao. P,

Abstract

:

af

In this paper we have demonstrated Location-Based Services (LBSs) which has surfaced as prominent applications in mobile networks. An important challenge in the wide deployment of location-based services (LBSs) is the privacy aware management of location information, providing safeguards for location privacy of mobile clients against vulnerabilities for abuse. This paper describes a scalable architecture for protecting the location privacy from various privacy threats resulting from uncontrolled usage of LBSs. This architecture includes the development of a personalized location anonymization model and a suite of location perturbation algorithms

Citation

:

af

Download

:

Authors

:

BHAVSINGH MALOTH, ,

Abstract

:

af

nowadays due to the increasing popularity of cloud computing, the data owners are driven to outsource their data to cloud servers for great convenience and reduced cost in data management. However, sensitive data should be encrypted before outsourcing for privacy requirements, which obsoletes data utilization like keyword-based document retrieval. In this paper, we solve the problem of multi-keyword ranked search over encrypted cloud data which simultaneously supports dynamic update operations like deletion and insertion of documents wise privacy in the cloud computing concept. As a result, allowing an encrypted cloud data search service is of extreme impact. In view of a large number of data users and documents in the cloud, it is essential to permit several keywords in the search demand and return documents in the order of their relevant to these keywords. The similar mechanism on searchable encryption makes center on single keyword search or Boolean keyword search and rarely sort the search results. In the middle of various multi-keyword semantics, deciding the well-organized similarity measure of “coordinate matching,” it means that as many matches as possible, to capture the appropriate data documents to the search query. Particularly, we consider “inner product similarity” and also we construct tree-based index structure, every document is connected with a binary vector as a sub-index where each bit characterize whether the matching keyword is contained in the document. The Ranked result provides top k retrieval results. Also, we propose an alert system which will generate alerts when an unauthorized user tries to access the data from the cloud, the alert will generate in the form of mail and message. And the ElGamal Cryptosystem allow users to occupy in the ranking while the popularity of computing work is done on the server side by a process only on cipher text which leads data leakage and data security is assured.

Download

:

Authors

:

Vijaya Kumari, Mr. G.LAKPATHI,

Abstract

:

af

In this paper, our proposed plan is Two Layer Encryption implies Twofold Encryption for safely outsourcing the information in the cloud. This plan takes care of key escrow issue and Information Uncover issue by RSA calculation of lopsided key methodology. In existing

Citation

:

af

Download

:

Authors

:

Ms.Jyothi, Mr.Ramarao,

Abstract

:

af

In distributed computing outsourcing, bunch resource among cloud customers is a significant test, so distributed computing gives a negligible exertion and all around sorted out the course of action. In light of perpetual change of investment, sharing data in a multi-proprietor way to an untrusted cloud is still its testing issue. In this paper, we proposed an ensured multi-proprietor data sharing arrangement for a dynamic gathering in individuals, by and large, cloud. By outfitting AES encryption with Concurrent key while exchanging the data, any cloud customer can securely confer data to others. Meanwhile, the limit overhead and encryption computation cost of the arrangement are free with the amount of revoked customers. Likewise, I separate the security of this arrangement with exhaustive affirmations. One-Time Mystery word is one of the least difficult and most surely understood sorts of affirmation that can be used for securing access to accounts.

Citation

:

af

Download

:

Authors

:

Venkatesh, Mr.Lalu Naik,

Abstract

:

af

Presently the significance of distributed computing rising with numerous divisions keeping in mind the end goal to decrease temperate Cost and enhance the income with enhancing cloud administration ease of use like IaaS, SaaS and PaaS administrations. In this association when bunch clients outsource their data to the cloud among the dynamic gathering no affirmation about client security ,data uprightness because of absence of data spillage and adjustments among gathering clients ,such a case client genuineness , client data protection and client disavowal is to be a testing issue with this framework, in this way to address every single above issue we proposed a novel system secure open reviewing for ensuring data respectability and credibility without bargaining security and validness furthermore for powerful client disavowal on element bunch.

Citation

:

af

Download

:

Authors

:

Shankar Sharma, Vanitha Rao,

Abstract

:

af

Enormous data is a tremendous gathering of unstructured data where it can gathers data from different sources like online networking, geological sources, chronicled sources etc. In request to extricate the helpful data among unstructured stockpiling database we utilize data mining systems which coordinate huge data properties. We utilize enormous data Properties to play out the data extraction errand in time which drives tedious process and create extricate data in less time.

Citation

:

af

Download

:

Authors

:

Santhosh Kumar Banothu, Mr.Linga Reddy,

Abstract

:

af

Mobile Ad-hoc Network (MANET) is a very powerful field in the progress of Wireless network. Over the past years Wireless ad-hoc network become most stimulating and vital field due to the popularity of mobile devices and wireless network. MANET is a network with many autonomous nodes i.e. mobile devices. MANET uses dynamic topology, wireless links, decentralized network and doesn’t need any cellular infrastructure. Due to mobile nature of nodes, the network topology may change rapidly and unpredictably time to time The network is decentralized, where all network activity including discovering the topology and delivering messages must be executed by the nodes themselves, i.e., routing functionality will be incorporated into mobile nodes. Many routing algorithms have been proposed and developed for accomplishing this task. Therefore, it is difficult to determine, in this paper we investigate Desirable Properties of Ad-Hoc Routing Protocols performs best under different situations like multiple routes, Routing Philosophy , Routing Schemes, Routing Overheads,latency,Scalability or Reliability, congestion, Security.

Citation

:

af

Download

:

Authors

:

Santhosh Kumar Banothu, Sandya,

Abstract

:

af

In this paper, we propose e-plant shopping plant at times known as e-tail from "electronic retail" or e-shopping is a type of electronic business which permits purchasers to straightforwardly purchase products or administrations from a vender over the Web utilizing a web program. Elective names are: e-web-store, e-shop, e-store, Web shop, web-store, online store, online retail facade and virtual store. The scope of plants and garden items (counting any portion of the products or any parts for them) which are accessible for buy from our site as per the terms. An understanding for us to offer you Merchandise is made on these terms when we acknowledge a request made by you by means of our Site. We will affirm acknowledgment of your request on-screen.